A BYOD policy in which employees are able to access the wireless guest network is in effect in an organization.
Some users however are using the Ethernet port in personal laptops to the wired network. Which of the
following could an administrator use to ensure that unauthorized devices are not allowed to access the wired
VLAN access rules configured to reject packets originating from unauthorized devices
Router access lists configured to block the IP addresses of unauthorized devices
Firewall rules configured to block the MAC addresses of unauthorized devices
Port security configured shut down the port when unauthorized devices connect